The Times Australia
The Times World News

.

here are 7 kinds of intelligence spies want, and how they get it

  • Written by Dennis B. Desmond, Lecturer, Cyberintelligence and Cybercrime Investigations, University of the Sunshine Coast

The news of a so-called “Chinese spy balloon[1]” being shot down over the US has reignited interest in how nation-states spy on one another.

It’s not confirmed that the balloon, seen floating over US military areas, was indeed a dedicated vessel for spying. China has claimed[2] it was a “civilian airship” deployed for weather research and blown off-course by the wind. Nonetheless, the very threat of potential spycraft has the US up in arms[3].

And that makes sense. The significance of intelligence can’t be overstated. Nations make important political, economic and military decisions based on it.

While people may chuckle at the idea of using a balloon to passively float above a country to spy on it, the reality is anything goes when it comes to getting the upper hand on your adversaries. So what are some other ways nations collect intelligence today?

Read more: Did China's balloon violate international law?[4]

Signals intelligence

One major intelligence collection strategy[5] is signals intelligence. This involves using a variety of ground- and space-based technologies to target the signals and communications coming from a target’s device/s.

The results, called the “product”, often reveal highly sensitive information, which explains why signals intelligence is also the most contested form of espionage.

Countries that turn this capability inward face mounting criticism from those caught in the net, and from citizens concerned with privacy. In 2013, Edward Snowden disclosed[6] the US National Security Agency’s use of signals intelligence for bulk data collection from the public. The US government has since worked to convince citizens the NSA’s efforts are largely focused on external collection.

The White House also recently published an executive order[7] on this topic.

Geo-spatial intelligence

Geo-spatial intelligence[8] concerns human activity on and beneath the ground, including waterways. It’s generally focused on military and civilian construction, human movements (such as movement of refugees and migrants) and natural resource use.

Geo-spatial intelligence exploits information obtained through satellites, drones, high-altitude aircraft and, yes, even balloons!

Spy balloons can collect not just images and signals, but also chemical analyses of the air. They aren’t common, since this approach lacks plausible deniability and (as we have seen) balloons are easily observed and shot down. On the other hand, they do offer a low radar signature, are cheap and can seem innocuous.

Imagery intelligence

Closely related to geo-spatial intelligence is imagery intelligence, which is also often conducted using satellites, drones and aircraft.

This is intelligence derived from the overhead collection of images of civilian and military activities. Imagery intelligence often focuses on the strategic movements of troops and weapons systems, and specifically targets military bases, nuclear arsenals and other strategic assets.

Measurement and signature intelligence

One highly technical form of intelligence collection – and one that’s rarely mentioned – is measurement and signature intelligence. This is intelligence derived from the electromagnetic signatures of rockets, command and control systems, radar and weapons systems, and other military and civilian equipment.

The data collection is done using high-tech instruments, designed specifically to identify and categorise the electromagnetic emanations. Among other things, this form of intelligence collection allows for the remote identification of weapons deployments and detailed information on space platforms.

Cyber intelligence

Cyber intelligence[9] is generally lumped together with signals intelligence, but is distinct in that it uses direct human interaction (such as through hackers) to penetrate protected systems and gain access to data.

Cyber intelligence refers to the overt and covert collection of information from friendly and adversarial networks. It can be obtained through signals collection, malware, or through hackers gaining direct unauthorised access into a systems. Nations may even target their own allies’ networks.

One example of cyber intelligence was the 2015 data breach of the US Office of Personnel Management[10]. This breach was designed to collect all the available information on US government and military personnel who had been screened for a security clearance.

Read more: US hack shows data is the new frontier in cyber security conflict[11]

Open source intelligence

The newest of the intelligence collection disciplines[12] is open source intelligence. Emerging in the late 1980s, open source information comes from a variety of primary sources such as newspapers, blogs, official postings and reports, and secondary sources such as leaks[13] on sites including WikiLeaks, The Intercept and social media.

Although this information is readily available, turning it into actionable intelligence requires specific tools such as web scrapers and data miners, as well as trained analysts who can find connections between large datasets.

Human intelligence

Human intelligence is the oldest form of intelligence collection and perhaps the most well-known. Spies are generally divided into three categories:

  • declared intelligence officers (overt)
  • people working under official cover, such as spies working as diplomats, military personnel and embassy/civilian support personnel
  • non-official cover spies, often ostensibly working in commercial, academic and trade positions.

Human intelligence officers will recruit citizens of a country to spy, wittingly or unwittingly, and run agents (co-operating citizens of a host nation) to support the strategic objectives of their nation.

Thanks to the internet and dark net, we now have cyber-based human intelligence that allows spies to assess, recruit and operate assets and sources from the safety of their home nation. This is even happening on LinkedIn[14].

While intelligence collection disguised as a stray weather balloon seems rather sloppy, the latest events remind us of the constant war for information that nations are waging. Analysts following the war in Ukraine are reviewing[15] reams of information to compare Russian, Chinese and Iranian weapon systems with those of Ukraine and its NATO supporters.

As the world continues to face new challenges, including climate change and the rapid development of new technologies, the intelligence focus of nations will likely need to expand to keep up.

References

  1. ^ Chinese spy balloon (gcp.theconversation.com)
  2. ^ has claimed (www.bbc.com)
  3. ^ up in arms (www.ft.com)
  4. ^ Did China's balloon violate international law? (theconversation.com)
  5. ^ intelligence collection strategy (theconversation.com)
  6. ^ disclosed (theconversation.com)
  7. ^ executive order (www.whitehouse.gov)
  8. ^ Geo-spatial intelligence (theconversation.com)
  9. ^ Cyber intelligence (theconversation.com)
  10. ^ US Office of Personnel Management (en.wikipedia.org)
  11. ^ US hack shows data is the new frontier in cyber security conflict (theconversation.com)
  12. ^ collection disciplines (theconversation.com)
  13. ^ leaks (www.smh.com.au)
  14. ^ LinkedIn (theconversation.com)
  15. ^ are reviewing (theconversation.com)

Read more https://theconversation.com/beyond-spy-balloons-here-are-7-kinds-of-intelligence-spies-want-and-how-they-get-it-199289

Times Magazine

Building an AI-First Culture in Your Company

AI isn't just something to think about anymore - it's becoming part of how we live and work, whether we like it or not. At the office, it definitely helps us move faster. But here's the thing: just using tools like ChatGPT or plugging AI into your wo...

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

What AI Adoption Means for the Future of Workplace Risk Management

Image by freepik As industrial operations become more complex and fast-paced, the risks faced by workers and employers alike continue to grow. Traditional safety models—reliant on manual oversight, reactive investigations, and standardised checklist...

The Times Features

Flipping vs. Holding: Which Investment Strategy Is Right for You?

Are you wondering whether flipping a property or holding onto it is the better investment strategy? The answer isn’t one-size-fits-all. Both strategies have distinct advantages a...

Why Everyone's Talking About Sea Moss - And Should You Try It Too?

Sea moss - a humble marine plant that’s been used for centuries - is making a major comeback in modern wellness circles. And it’s not just a trend. With growing interest from athle...

A Guide to Smarter Real Estate Accounting: What You Might Be Overlooking

Real estate accounting can be a complex terrain, even for experienced investors and property managers. From tracking rental income to managing property expenses, the financial in...

What Is the Dreamtime? Understanding Aboriginal Creation Stories Through Art

Aboriginal culture is built on the deep and important meaning of Dreamtime, which links beliefs and history with the elements that make life. It’s not just myths; the Dreamtime i...

How Short-Term Lenders Offer Long-Lasting Benefits in Australia

In the world of personal and business finance, short-term lenders are often viewed as temporary fixes—quick solutions for urgent cash needs. However, in Australia, short-term len...

Why School Breaks Are the Perfect Time to Build Real Game Skills

School holidays provide uninterrupted time to focus on individual skill development Players often return sharper and more confident after structured break-time training Holid...